#security #CVE
CVE-2019-1347: When a #mouse over a file is enough to crash your system:
https://blog.tetrane.com/2019/11/12/pe-parser-crash.html (via)
CVE-2019-1347: When a #mouse over a file is enough to crash your system:
https://blog.tetrane.com/2019/11/12/pe-parser-crash.html (via)
Twitter
NoNamePodcast
CVE-2019-1347: When a mouse over a file is enough to crash your system https://t.co/O4UMHFCDK5
#programming
A fresh #report on developer ecosystem has been published from #JetBrains
https://www.jetbrains.com/lp/devecosystem-2019/
A fresh #report on developer ecosystem has been published from #JetBrains
https://www.jetbrains.com/lp/devecosystem-2019/
JetBrains
The state of Developer Ecosystem in 2019 Infographic
Almost 7,000 developers share their insights on modern technologies, programming languages, frameworks, and tools of choice for software development.
#security #email
Almost cyberpunk crime 😍
https://research.checkpoint.com/2019/incident-response-casefile-a-successful-bec-leveraging-lookalike-domains/
Almost cyberpunk crime 😍
https://research.checkpoint.com/2019/incident-response-casefile-a-successful-bec-leveraging-lookalike-domains/
Check Point Research
Incident Response Casefile – A successful BEC leveraging lookalike domains - Check Point Research
By Matan Ben David, Incident response Analyst Imagine that you’re the owner of a startup and waiting for a million-dollar seed round of funding, only it never shows up in your bank account. Or imagine you’re the head of a venture capital firm who believes…
#security #Microsoft #password
https://www.zdnet.com/article/44-million-microsoft-users-reused-passwords-in-the-first-three-months-of-2019/
https://www.zdnet.com/article/44-million-microsoft-users-reused-passwords-in-the-first-three-months-of-2019/
ZDNet
44 million Microsoft users reused passwords in the first three months of 2019
Microsoft used a database of three billion publicly leaked credentials to identify users who reused passwords.
#quote #cloud
Starting today, I’m rebranding myself. I’m not a “remote employee”. I’m a “cloud native employee”.
I expect this will help with career growth and advancement.
https://twitter.com/billwagner/status/1201883110889185281
Starting today, I’m rebranding myself. I’m not a “remote employee”. I’m a “cloud native employee”.
I expect this will help with career growth and advancement.
https://twitter.com/billwagner/status/1201883110889185281
#security #hack #camera #Ring
https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras
https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras
Vice
How Hackers Are Breaking Into Ring Cameras
After a hacker broke into a Ring camera in Tennessee and spoke to a child, Motherboard found hackers have made dedicated software for gaining access.